{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:23:58Z","timestamp":1763202238583},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T00:00:00Z","timestamp":1567728000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T00:00:00Z","timestamp":1567728000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s12652-019-01430-y","type":"journal-article","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T17:32:34Z","timestamp":1567791154000},"page":"2899-2912","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A generalization model for multi-record privacy preservation"],"prefix":"10.1007","volume":"11","author":[{"given":"Xinning","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhiping","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,6]]},"reference":[{"key":"1430_CR1","doi-asserted-by":"crossref","unstructured":"Acs G, Achara JP, Castelluccia C (2015) Probabilistic km-anonymity efficient anonymization of large set-valued datasets. In: 2015 IEEE international conference on big data (Big Data), pp 1164\u20131173","DOI":"10.1109\/BigData.2015.7363870"},{"issue":"1","key":"1430_CR2","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1186\/s13638-016-0767-1","volume":"2016","author":"Z Chen","year":"2016","unstructured":"Chen Z, Kang H, Yin S, Kim S (2016) An efficient privacy protection in mobility social network services with novel clustering-based anonymization. Eurasip J Wirel Commun Netw 2016(1):275","journal-title":"Eurasip J Wirel Commun Netw"},{"key":"1430_CR3","doi-asserted-by":"publisher","first-page":"20590","DOI":"10.1109\/ACCESS.2017.2756872","volume":"5","author":"Z Ge","year":"2017","unstructured":"Ge Z, Song Z, Ding SX (2017) Data mining and analytics in the process industry: the role of machine learning. IEEE Access 5:20590\u201320616","journal-title":"IEEE Access"},{"key":"1430_CR4","unstructured":"Ghinita G, Karras P, Kalnis P, Mamoulis N (2007) Fast data anonymization with low information loss. In: 33rd international conference on very large data bases, VLDB 2007\u2013conference proceedings, pp 758 \u2013 769"},{"issue":"1","key":"1430_CR5","doi-asserted-by":"publisher","first-page":"934","DOI":"10.14778\/1687627.1687733","volume":"2","author":"Y He","year":"2009","unstructured":"He Y, Naughton JF (2009) Anonymization of set-valued data via top-down, local generalization. Proc VLDB Endow 2(1):934\u2013945","journal-title":"Proc VLDB Endow"},{"key":"1430_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSMC.2018.2872902","volume":"99","author":"J Le","year":"2018","unstructured":"Le J, Zhang D, Mu N, Liao X, Yang F (2018) Anonymous privacy preservation based on m-signature and fuzzy processing for real-time data release. IEEE Trans Syst Man Cybern Syst 99:1\u201313","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"1430_CR7","doi-asserted-by":"crossref","unstructured":"LeFevre K, DeWitt DJ, Ramakrishnan R (2006) Mondrian multidimensional k-anonymity. In: 22nd International conference on data engineering (ICDE\u201906) vol 1, p 25","DOI":"10.1109\/ICDE.2006.101"},{"issue":"3","key":"1430_CR8","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TKDE.2017.2773069","volume":"30","author":"B Li","year":"2018","unstructured":"Li B, Liu Y, Han X, Zhang J (2018) Cross-bucket generalization for information and privacy preservation. IEEE Trans Knowl Data Eng 30(3):449\u2013459","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"6","key":"1430_CR9","doi-asserted-by":"publisher","first-page":"e3886","DOI":"10.1002\/cpe.3886","volume":"29","author":"X Liu","year":"2017","unstructured":"Liu X, Xie Q, Wang L (2017) Personalized extended (alpha, k)-anonymity model for privacy preserving data publishing. Concurr Comput Pract Exp 29(6):e3886","journal-title":"Concurr Comput Pract Exp"},{"issue":"1","key":"1430_CR10","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s10115-012-0544-3","volume":"36","author":"G Loukides","year":"2013","unstructured":"Loukides G, Gkoulalas-Divanis A, Shao J (2013) Efficient and flexible anonymization of transaction data. Knowl Inf Syst 36(1):153\u2013210","journal-title":"Knowl Inf Syst"},{"issue":"2","key":"1430_CR11","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1049\/cje.2017.01.024","volume":"26","author":"Q Lu","year":"2017","unstructured":"Lu Q, Wang C, Xiong Y, Xia H, Huang W, Gong X (2017) Personalized privacy-preserving trajectory data publishing. Chin J Electron 26(2):285\u2013291","journal-title":"Chin J Electron"},{"issue":"6","key":"1430_CR12","first-page":"1062","volume":"19","author":"S Ni","year":"2017","unstructured":"Ni S, Xie M, Qian Q (2017) Clustering based k-anonymity algorithm for privacy preservation. IJ Netw Secur 19(6):1062\u20131071","journal-title":"IJ Netw Secur"},{"key":"1430_CR13","doi-asserted-by":"crossref","unstructured":"Poulis G, Loukides G, Gkoulalas-Divanis A, Skiadopoulos S (2013) Anonymizing data with relational and transaction attributes. Lecture notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8190 LNAI(PART 3), pp 353\u2013369","DOI":"10.1007\/978-3-642-40994-3_23"},{"key":"1430_CR14","unstructured":"Sei Y, Okumura H, Takenouchi T, Ohsuga A (2017) Anonymization of sensitive quasi-identifiers for l-diversity and t-closeness. In: IEEE transactions on dependable and secure computing, pp 1\u20131"},{"issue":"2","key":"1430_CR15","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1515\/cait-2017-0015","volume":"17","author":"MA Sheela","year":"2017","unstructured":"Sheela MA, Vijayalakshmi K (2017) Partition based perturbation for privacy preserving distributed data mining. Cybernetics and Information Technologies 17(2):44\u201355","journal-title":"Cybernetics and Information Technologies"},{"key":"1430_CR16","doi-asserted-by":"crossref","unstructured":"Sopaoglu U, Abul O (2017) A top-down k-anonymization implementation for apache spark. In: 2017 IEEE international conference on big data (big data), pp 4513\u20134521","DOI":"10.1109\/BigData.2017.8258492"},{"issue":"5","key":"1430_CR17","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) K-generalization: A model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(5):557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl Based Syst"},{"issue":"1","key":"1430_CR18","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s00778-010-0192-8","volume":"20","author":"M Terrovitis","year":"2011","unstructured":"Terrovitis M, Mamoulis N, Kalnis P (2011) Local and global recoding methods for anonymizing set-valued data. VLDB J 20(1):83\u2013106","journal-title":"VLDB J"},{"issue":"10","key":"1430_CR19","doi-asserted-by":"publisher","first-page":"944","DOI":"10.14778\/2336664.2336668","volume":"5","author":"M Terrovitis","year":"2012","unstructured":"Terrovitis M, Liagouris J, Mamoulis N, Skiadopoulos S (2012) Privacy preservation by disassociation. Proc VLDB Endow 5(10):944\u2013955","journal-title":"Proc VLDB Endow"},{"key":"1430_CR20","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.ins.2016.01.100","volume":"348","author":"K Wang","year":"2016","unstructured":"Wang K, Wang P, Fu AW, Wong RCW (2016) Generalized bucketization scheme for flexible privacy settings. Inf Sci 348:377\u2013393","journal-title":"Inf Sci"},{"issue":"12","key":"1430_CR21","first-page":"6849","volume":"7","author":"SL Wang","year":"2011","unstructured":"Wang SL, Tsai YC, Kao HY, Hong TP (2011) Extending suppression for anonymization on set-valued data. Int J Innov Comput Inf Control 7(12):6849\u20136863","journal-title":"Int J Innov Comput Inf Control"},{"issue":"4","key":"1430_CR22","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1007\/s10489-014-0554-9","volume":"41","author":"SL Wang","year":"2014","unstructured":"Wang SL, Tsai YC, Kao HY (2014) On anonymizing transactions with sensitive items. Appl Intell 41(4):1043\u20131058","journal-title":"Appl Intell"},{"key":"1430_CR23","doi-asserted-by":"crossref","unstructured":"Xiao X, Yi K, Tao Y (2010) The hardness and approximation algorithms for l-diversity. Advances in Database Technology\u2014EDBT 2010. In: 13th International conference on extending database technology, proceedings, pp 135 \u2013 146","DOI":"10.1145\/1739041.1739060"},{"key":"1430_CR24","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.ins.2016.10.038","volume":"378","author":"Y Xin","year":"2017","unstructured":"Xin Y, Xie Z, Yang J (2017) The privacy preserving method for dynamic trajectory releasing based on adaptive clustering. Inf Sci 378:131\u2013143","journal-title":"Inf Sci"},{"issue":"1","key":"1430_CR25","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s10115-015-0906-8","volume":"49","author":"H Zakerzadeh","year":"2016","unstructured":"Zakerzadeh H, Aggarwal CC, Barker K (2016) Managing dimensionality in data privacy anonymization. Knowl Inf Syst 49(1):341\u2013373","journal-title":"Knowl Inf Syst"},{"issue":"2","key":"1430_CR26","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TCC.2015.2430316","volume":"6","author":"H Zhang","year":"2015","unstructured":"Zhang H, Zhou Z, Ye L (2015) Towards privacy preserving publishing of set-valued data on hybrid cloud. IEEE Trans Cloud Comput 6(2):316\u2013329","journal-title":"IEEE Trans Cloud Comput"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01430-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01430-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01430-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T23:22:31Z","timestamp":1599261751000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01430-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,6]]},"references-count":26,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["1430"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01430-y","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,6]]},"assertion":[{"value":"24 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}